First published: Thu Apr 30 2020(Updated: )
On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when the BIG-IP Virtual Edition (VE) is configured with VLAN groups and there are devices configured with OSPF connected to it, the Network Device Abstraction Layer (NDAL) Interfaces can lock up and in turn disrupting the communication between the mcpd and tmm processes.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Access Policy Manager | >=13.1.0<=13.1.3.3 | |
F5 Access Policy Manager | >=14.1.0<=14.1.2.3 | |
F5 Access Policy Manager | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Analytics | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Analytics | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Application Acceleration Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Application Acceleration Manager | >=15.0.0<=15.1.0.1 | |
F5 Application Security Manager | >=13.1.0<=13.1.3.3 | |
F5 Application Security Manager | >=14.1.0<=14.1.2.3 | |
F5 Application Security Manager | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Fraud Protection Service | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Fraud Protection Service | >=15.0.0<=15.1.0.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3.3 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<=14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Link Controller | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Link Controller | >=15.0.0<=15.1.0.1 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.3.3 | |
Riverbed SteelApp Traffic Manager | >=14.1.0<=14.1.2.3 | |
Riverbed SteelApp Traffic Manager | >=15.0.0<=15.1.0.1 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.3.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.1.0<=14.1.2.3 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<=15.1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5881 is rated as a high severity vulnerability due to its potential to disrupt network operations.
To fix CVE-2020-5881, upgrade the affected BIG-IP versions to a non-vulnerable version as specified in the vendor's security advisory.
CVE-2020-5881 affects BIG-IP Virtual Editions running versions 15.0.0 to 15.1.0.1, 14.1.0 to 14.1.2.3, and 13.1.0 to 13.1.3.3.
Exploiting CVE-2020-5881 can lead to the Network Device Abstraction Layer (NDAL) Interfaces locking up, causing communication disruptions.
There are no specific workarounds for CVE-2020-5881; the best mitigation is to update to a fixed version.